PART-A - SNS Courseware

advertisement
CRYPTOGRAPHY AND NETWORK SECURITY -3IAE ANSWER KEY
SNS COLLEGE OF ENGINEERING
Kurumbapalayam(Po), Coimbatore – 641 107
Accredited by NAAC-UGC with ‘A’ Grade
Approved by AICTE & Affiliated to Anna University, Chennai
INTERNAL ASSESMENT EXAMINATIONS - III
COURSE: B.E – CSE
IT2352 – CRYPTOGRAPHY AND NETWORK SECURITY
ANSWER KEY
PART-A
1.Give an example each for substitution and transposition ciphers
Additive cipher in which the shifting of letter is been done by giving the value as key value.
when the key value is given the shifting of letter is done according to the given term.
In transposition cipher it rearranges the character in the plain text to form the cipher text. The
railfence is writing the plaintext in two rows proceeding down then across and reading the cipher
text, then down.
2. Differentiate between active attack and passive attack.
PASSIVE ATTACK
 In passive it only monitors the
transmission
 Very difficult to detect
 The attack ismainly on the prevention
method
 It does not affect the system
ACTIVE ATTACK
It involves in the modifying of the data stream
Easy to detect
It is quite difficult to prevent
It affects the system
3. What are the modes of DES?
ECB(electronic code book)
o CBC(cipher block chaining)
o CFB(cipher feedback)
o Output feedback
4. Define factoring?
It is the decomposition of an object into a product of other objects or factors, which when
multiplied together give the original
5. What is discrete logarithm problem?
CRYPTOGRAPHY AND NETWORK SECURITY -3IAE ANSWER KEY
It defined with regard to multiplicative cyclic groups. if G is a multiplicative cyclic group and g
is a generator G,then from the definition in element h in G can be written as g is the power of x
,x has some value.
6. Write differences between MD4 and Secure Hash Algorithm



MD4
Speed is faster
It uses little endian scheme
No limit on message size
SECURE HASH
Not that much speed
It uses big endian scheme
Limit on message size
7. List out the services provided by PGP.
Digital signature, message encryption, compression, email compatibility and segmentation.
8. State the use of tunnel mode in IP Security


It provides the protection to IP packet
It is used when one or bothends of an SA is a security gateway
9. Name three different classes of intruders and also define intruders
Masquerader ,misfeasor, clandestine user
10. Define firewall and mention the types of firewall
It is inserted between the internet and LAN for security purpose.it protects the LAN from
internet based attacks. types are Packet filtering router, Application level gateway, Circuit level
gateway
PART B
11a)i) State and explain chinese remainder therorem with example



Find a number x such it have remainder of 1,A ->(a1,a2,a3,……ak),where Aelement of
zmi and ai=Amod mifor 1<=i<=k.suppose thatm1,m2…..mi ae pairwise relatively prime
positive integers and let a1,a2….ar be integers .the system of congruences x=a i(mod
mi)for the given values has a unique solution
Then x0 and x1 is equals 0(mod Mi)
The value of modulo m is been determined
CRYPTOGRAPHY AND NETWORK SECURITY -3IAE ANSWER KEY
a)ii) State fermat’s and euler theorem.
if p is prime and is an integer not divisible by p then,
ap-1=1(modp)
ap=a(modp)
euler form:
api(1 mod n)
R={x1,x2,xpi(n))}
11)b) Discuss classical crypto system and its types
Shift cipher, playfair cipher, hill cipher, one time pad, monoalphabetic cipher, polyalphabetic
cipher, vigenre, transposition cipher
12)a) Explain about DES in detail.
Details of single round, key generation,DES encryption,DES decryption,DES weak
keys,advantage of DES and disadvantage,double DES
12b)i) Explain RSA algorithm.
Algorithm









Pick two large prime number p and q p!=q
Calculate n=p*q
Calculate pi(n)=(p-1)(q-1)
Gcd(e,pi(n))=1
Calculate d so that d.e(mod pi(n)=1 d is found
Ku={e,n}
KR={d,n}
C=Pemodn
P=Cd mod n
CRYPTOGRAPHY AND NETWORK SECURITY -3IAE ANSWER KEY
b)ii) Demonstrate the encryption and decryption for the RSA algorithm parameters
p=3,q=11,e=7,m=5. D=?
p=3,q=11,e=7,m=5
sol:






n=p*q=3*11=33
pi(n)= (p-1)(q-1) =2*10=20
e=7,m=5 d=[3*7]mod pi(n)=1
d=3
C=Pe mod n =57 mod 33=14
P=Cd mod n = 143 mod 33 = 5
13a)i ) Briefly explain secure hash algorithm
SHA


Features of SHA,secure hash algorithm(SHA 512),description of SHA,block cipher
text,SHA 512 logic
Append padding bits,append length,initialize of buffer,process message in 1024bit
block,SHA round function
13)b)i) Write about Digital signature standard




It is of public key algorithm
Attacks,confidentiality
Encrypt the entire message with the sender secret key
Digital signature standardit also uses the secure hash algorithm and the DSA term used
over in it
b)ii) Elaborate digital signature algorithm.




h(p-1)/q modp
it selects the private key and generate the a public key.the private key x must be a number
from 1 to (q-1)
public key is calculated from the private key as y=gx mod p
public key components(p,q,g)
CRYPTOGRAPHY AND NETWORK SECURITY -3IAE ANSWER KEY


users private key of the messageH(M)
an additional integer(K)
14)a)i) Write short notes about
Kerberos.
Authentication protocol. The mutual authentication is been achieved in it. Kerberos terminology
Authentication server(AS), client, credentials, credentials cache, crypt hash, key, realm, ticket
granting system,ticket granting ticket
Kerberos server, client, application server
a)ii)X-509.
Directory service which maintains the data base
Version, certificate serial number, signature algorithm, issuer name, period of validity, subject
name, subject unique identifier, subject unique identifier, extension, signature
Authentication procedures
One way authentication, two way authentication, three way authentication
14)b)i) Discuss Pretty Good Privacy.






PGP operation,
cryptographic keys and key Rings,
message format,
PGP message generation,
PGP message reception,
concept of trust
b)ii) Describe shortly SSL and SET.



services providedby SET,
requirement for SET
features for SET,
CRYPTOGRAPHY AND NETWORK SECURITY -3IAE ANSWER KEY


SET participants,
key technologies of SET
15)a)i) Explain intrusion detection system







Anomaly detection,
signature base detection,
threshold detection,
audit record format,
components of IDS host agent module,
LAN module,
central module
a)ii) Briefly mention about viruses and its threats





Phases of virus: dormant virus,
propagation,
triggering,
execution.types:
Parasitic, bootsector virus, stealth virus, polymorphic virus, metamorphic.
15)b) Write in detail about characteristics, types and limitations of firewalls
It is inserted between the internet and LAN for security purpose.it protects the LAN frominternet
basedattacks.types are



Packet filtering router,
Application level gateway,
Circuit level gateway
CRYPTOGRAPHY AND NETWORK SECURITY -3IAE ANSWER KEY
Download